GET /api/techniques/376/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 376,
    "key": "appinit-dll-injection",
    "unprotect_id": "U1244, T1546",
    "name": "AppInit DLL Injection",
    "description": "Any **Dynamic Link Libraries (DLL)** that are specified within the `AppInit_DLLs` registry key values are loaded by user32.dll into any process that utilizes user32.dll. So by modifying the `AppInit_DLLs` registry key value and pointing it to a malicious DLL, an attacker can force the system to load their DLL into every process that utilizes user32.dll and force it to execute their code.",
    "windows": "",
    "linux": "",
    "macos": "",
    "resources": "https://attack.mitre.org/techniques/T1546/010/",
    "creation_date": "2024-08-17T16:05:00.052918Z",
    "tags": "",
    "modification_date": "2024-08-17T16:08:18.408557Z",
    "category": [
        4,
        10
    ],
    "rules": [],
    "attachments": [],
    "featured_api": [
        313,
        321
    ],
    "contributors": [
        41
    ]
}